2012-09-16 18:52:32 +04:00
|
|
|
<?php
|
|
|
|
/**
|
2016-07-21 18:07:57 +03:00
|
|
|
* @copyright Copyright (c) 2016, ownCloud, Inc.
|
|
|
|
*
|
2019-12-03 21:57:53 +03:00
|
|
|
* @author Ari Selseng <ari@selseng.net>
|
2016-05-26 20:56:05 +03:00
|
|
|
* @author Arthur Schiwon <blizzz@arthur-schiwon.de>
|
|
|
|
* @author Björn Schießle <bjoern@schiessle.org>
|
2020-03-31 11:49:10 +03:00
|
|
|
* @author Christoph Wurst <christoph@winzerhof-wurst.at>
|
2016-05-26 20:56:05 +03:00
|
|
|
* @author Daniel Jagszent <daniel@jagszent.de>
|
2017-11-06 17:56:42 +03:00
|
|
|
* @author Joas Schilling <coding@schilljs.com>
|
2015-03-26 13:44:34 +03:00
|
|
|
* @author Jörn Friedrich Dreyer <jfd@butonic.de>
|
2016-05-26 20:56:05 +03:00
|
|
|
* @author Lukas Reschke <lukas@statuscode.ch>
|
2015-03-26 13:44:34 +03:00
|
|
|
* @author Martin Mattel <martin.mattel@diemattels.at>
|
|
|
|
* @author Morris Jobke <hey@morrisjobke.de>
|
|
|
|
* @author Owen Winkler <a_github@midnightcircus.com>
|
2016-07-21 19:13:36 +03:00
|
|
|
* @author Robin Appelman <robin@icewind.nl>
|
2016-01-12 17:02:16 +03:00
|
|
|
* @author Robin McCorkell <robin@mccorkell.me.uk>
|
2015-03-26 13:44:34 +03:00
|
|
|
* @author Thomas Müller <thomas.mueller@tmit.eu>
|
2020-12-16 16:54:15 +03:00
|
|
|
* @author Vincent Petry <vincent@nextcloud.com>
|
2015-03-26 13:44:34 +03:00
|
|
|
*
|
|
|
|
* @license AGPL-3.0
|
|
|
|
*
|
|
|
|
* This code is free software: you can redistribute it and/or modify
|
|
|
|
* it under the terms of the GNU Affero General Public License, version 3,
|
|
|
|
* as published by the Free Software Foundation.
|
|
|
|
*
|
|
|
|
* This program is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
* GNU Affero General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU Affero General Public License, version 3,
|
2019-12-03 21:57:53 +03:00
|
|
|
* along with this program. If not, see <http://www.gnu.org/licenses/>
|
2015-03-26 13:44:34 +03:00
|
|
|
*
|
2012-09-16 18:52:32 +04:00
|
|
|
*/
|
2015-02-26 13:37:37 +03:00
|
|
|
|
2012-09-16 18:52:32 +04:00
|
|
|
namespace OC\Files\Cache;
|
|
|
|
|
2021-01-03 17:28:31 +03:00
|
|
|
use Doctrine\DBAL\Exception;
|
2013-06-14 17:30:41 +04:00
|
|
|
use OC\Files\Filesystem;
|
2013-07-19 18:32:43 +04:00
|
|
|
use OC\Hooks\BasicEmitter;
|
2015-12-02 17:05:29 +03:00
|
|
|
use OCP\Files\Cache\IScanner;
|
2016-06-01 15:22:12 +03:00
|
|
|
use OCP\Files\ForbiddenException;
|
2018-04-25 16:22:28 +03:00
|
|
|
use OCP\ILogger;
|
2015-06-03 17:44:57 +03:00
|
|
|
use OCP\Lock\ILockingProvider;
|
2013-06-14 17:30:41 +04:00
|
|
|
|
2013-07-19 18:32:43 +04:00
|
|
|
/**
|
|
|
|
* Class Scanner
|
|
|
|
*
|
|
|
|
* Hooks available in scope \OC\Files\Cache\Scanner:
|
|
|
|
* - scanFile(string $path, string $storageId)
|
|
|
|
* - scanFolder(string $path, string $storageId)
|
2013-11-07 19:22:29 +04:00
|
|
|
* - postScanFile(string $path, string $storageId)
|
|
|
|
* - postScanFolder(string $path, string $storageId)
|
2013-07-19 18:32:43 +04:00
|
|
|
*
|
|
|
|
* @package OC\Files\Cache
|
|
|
|
*/
|
2015-12-02 17:05:29 +03:00
|
|
|
class Scanner extends BasicEmitter implements IScanner {
|
2012-10-03 13:24:49 +04:00
|
|
|
/**
|
|
|
|
* @var \OC\Files\Storage\Storage $storage
|
|
|
|
*/
|
2014-05-28 15:59:38 +04:00
|
|
|
protected $storage;
|
2012-10-03 13:24:49 +04:00
|
|
|
|
2012-11-22 01:44:43 +04:00
|
|
|
/**
|
|
|
|
* @var string $storageId
|
|
|
|
*/
|
2014-05-28 15:59:38 +04:00
|
|
|
protected $storageId;
|
2012-11-22 01:44:43 +04:00
|
|
|
|
2012-10-03 13:24:49 +04:00
|
|
|
/**
|
|
|
|
* @var \OC\Files\Cache\Cache $cache
|
|
|
|
*/
|
2014-05-28 15:59:38 +04:00
|
|
|
protected $cache;
|
2012-10-03 13:24:49 +04:00
|
|
|
|
2014-05-30 17:42:41 +04:00
|
|
|
/**
|
|
|
|
* @var boolean $cacheActive If true, perform cache operations, if false, do not affect cache
|
|
|
|
*/
|
|
|
|
protected $cacheActive;
|
|
|
|
|
2014-09-08 03:34:03 +04:00
|
|
|
/**
|
2014-09-08 18:34:03 +04:00
|
|
|
* @var bool $useTransactions whether to use transactions
|
2014-09-08 03:34:03 +04:00
|
|
|
*/
|
|
|
|
protected $useTransactions = true;
|
|
|
|
|
2015-06-03 17:44:57 +03:00
|
|
|
/**
|
|
|
|
* @var \OCP\Lock\ILockingProvider
|
|
|
|
*/
|
|
|
|
protected $lockingProvider;
|
|
|
|
|
2012-10-03 13:24:49 +04:00
|
|
|
public function __construct(\OC\Files\Storage\Storage $storage) {
|
|
|
|
$this->storage = $storage;
|
2012-11-22 01:44:43 +04:00
|
|
|
$this->storageId = $this->storage->getId();
|
2012-11-18 17:10:28 +04:00
|
|
|
$this->cache = $storage->getCache();
|
2017-07-27 14:43:18 +03:00
|
|
|
$this->cacheActive = !\OC::$server->getConfig()->getSystemValue('filesystem_cache_readonly', false);
|
2015-06-03 17:44:57 +03:00
|
|
|
$this->lockingProvider = \OC::$server->getLockingProvider();
|
2012-10-03 13:24:49 +04:00
|
|
|
}
|
|
|
|
|
2014-09-08 03:34:03 +04:00
|
|
|
/**
|
|
|
|
* Whether to wrap the scanning of a folder in a database transaction
|
|
|
|
* On default transactions are used
|
|
|
|
*
|
|
|
|
* @param bool $useTransactions
|
|
|
|
*/
|
|
|
|
public function setUseTransactions($useTransactions) {
|
|
|
|
$this->useTransactions = $useTransactions;
|
|
|
|
}
|
|
|
|
|
2012-09-16 18:52:32 +04:00
|
|
|
/**
|
|
|
|
* get all the metadata of a file or folder
|
|
|
|
* *
|
2012-09-26 19:52:02 +04:00
|
|
|
*
|
2012-10-03 13:24:49 +04:00
|
|
|
* @param string $path
|
2014-05-11 21:13:51 +04:00
|
|
|
* @return array an array of metadata of the file
|
2012-09-16 18:52:32 +04:00
|
|
|
*/
|
2015-12-02 17:05:29 +03:00
|
|
|
protected function getData($path) {
|
2015-04-20 17:50:12 +03:00
|
|
|
$data = $this->storage->getMetaData($path);
|
|
|
|
if (is_null($data)) {
|
2018-04-25 16:22:28 +03:00
|
|
|
\OCP\Util::writeLog(Scanner::class, "!!! Path '$path' is not accessible or present !!!", ILogger::DEBUG);
|
2013-10-24 16:24:56 +04:00
|
|
|
}
|
2012-09-16 18:52:32 +04:00
|
|
|
return $data;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* scan a single file and store it in the cache
|
|
|
|
*
|
2012-10-03 13:24:49 +04:00
|
|
|
* @param string $file
|
2013-06-14 18:53:08 +04:00
|
|
|
* @param int $reuseExisting
|
2014-09-10 17:57:59 +04:00
|
|
|
* @param int $parentId
|
2020-02-15 00:09:11 +03:00
|
|
|
* @param array|null|false $cacheData existing data in the cache for the file to be scanned
|
2015-06-18 15:30:25 +03:00
|
|
|
* @param bool $lock set to false to disable getting an additional read lock during scanning
|
2020-03-27 19:47:20 +03:00
|
|
|
* @param null $data the metadata for the file, as returned by the storage
|
2014-05-11 21:13:51 +04:00
|
|
|
* @return array an array of metadata of the scanned file
|
2015-06-18 15:30:25 +03:00
|
|
|
* @throws \OCP\Lock\LockedException
|
2012-09-16 18:52:32 +04:00
|
|
|
*/
|
2020-03-27 19:47:20 +03:00
|
|
|
public function scanFile($file, $reuseExisting = 0, $parentId = -1, $cacheData = null, $lock = true, $data = null) {
|
2016-11-09 12:58:11 +03:00
|
|
|
if ($file !== '') {
|
|
|
|
try {
|
|
|
|
$this->storage->verifyPath(dirname($file), basename($file));
|
|
|
|
} catch (\Exception $e) {
|
2016-11-02 11:23:01 +03:00
|
|
|
return null;
|
|
|
|
}
|
|
|
|
}
|
2016-01-13 23:40:48 +03:00
|
|
|
// only proceed if $file is not a partial file nor a blacklisted file
|
|
|
|
if (!self::isPartialFile($file) and !Filesystem::isFileBlacklisted($file)) {
|
|
|
|
|
|
|
|
//acquire a lock
|
2015-06-18 14:47:03 +03:00
|
|
|
if ($lock) {
|
2016-01-04 16:11:21 +03:00
|
|
|
if ($this->storage->instanceOfStorage('\OCP\Files\Storage\ILockingStorage')) {
|
|
|
|
$this->storage->acquireLock($file, ILockingProvider::LOCK_SHARED, $this->lockingProvider);
|
|
|
|
}
|
2015-06-18 14:47:03 +03:00
|
|
|
}
|
2016-01-13 23:40:48 +03:00
|
|
|
|
2016-06-01 15:22:12 +03:00
|
|
|
try {
|
2020-03-27 19:47:20 +03:00
|
|
|
$data = $data ?? $this->getData($file);
|
2016-06-01 15:22:12 +03:00
|
|
|
} catch (ForbiddenException $e) {
|
2017-08-25 15:53:16 +03:00
|
|
|
if ($lock) {
|
|
|
|
if ($this->storage->instanceOfStorage('\OCP\Files\Storage\ILockingStorage')) {
|
|
|
|
$this->storage->releaseLock($file, ILockingProvider::LOCK_SHARED, $this->lockingProvider);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-06-01 15:22:12 +03:00
|
|
|
return null;
|
|
|
|
}
|
2016-01-13 23:40:48 +03:00
|
|
|
|
2017-08-25 15:53:16 +03:00
|
|
|
try {
|
|
|
|
if ($data) {
|
2016-01-13 23:40:48 +03:00
|
|
|
|
2017-08-25 15:53:16 +03:00
|
|
|
// pre-emit only if it was a file. By that we avoid counting/treating folders as files
|
|
|
|
if ($data['mimetype'] !== 'httpd/unix-directory') {
|
2020-03-26 11:30:18 +03:00
|
|
|
$this->emit('\OC\Files\Cache\Scanner', 'scanFile', [$file, $this->storageId]);
|
|
|
|
\OC_Hook::emit('\OC\Files\Cache\Scanner', 'scan_file', ['path' => $file, 'storage' => $this->storageId]);
|
2017-08-25 15:53:16 +03:00
|
|
|
}
|
2016-01-13 23:40:48 +03:00
|
|
|
|
2017-08-25 15:53:16 +03:00
|
|
|
$parent = dirname($file);
|
|
|
|
if ($parent === '.' or $parent === '/') {
|
|
|
|
$parent = '';
|
|
|
|
}
|
|
|
|
if ($parentId === -1) {
|
|
|
|
$parentId = $this->cache->getParentId($file);
|
|
|
|
}
|
2014-06-10 17:37:43 +04:00
|
|
|
|
2017-08-25 15:53:16 +03:00
|
|
|
// scan the parent if it's not in the cache (id -1) and the current file is not the root folder
|
|
|
|
if ($file and $parentId === -1) {
|
|
|
|
$parentData = $this->scanFile($parent);
|
|
|
|
if (!$parentData) {
|
|
|
|
return null;
|
|
|
|
}
|
|
|
|
$parentId = $parentData['fileid'];
|
2016-11-02 11:23:01 +03:00
|
|
|
}
|
2017-08-25 15:53:16 +03:00
|
|
|
if ($parent) {
|
|
|
|
$data['parent'] = $parentId;
|
|
|
|
}
|
|
|
|
if (is_null($cacheData)) {
|
|
|
|
/** @var CacheEntry $cacheData */
|
|
|
|
$cacheData = $this->cache->get($file);
|
2014-06-10 17:26:18 +04:00
|
|
|
}
|
2017-08-25 15:53:16 +03:00
|
|
|
if ($cacheData and $reuseExisting and isset($cacheData['fileid'])) {
|
|
|
|
// prevent empty etag
|
|
|
|
if (empty($cacheData['etag'])) {
|
|
|
|
$etag = $data['etag'];
|
|
|
|
} else {
|
|
|
|
$etag = $cacheData['etag'];
|
2013-06-14 18:53:08 +04:00
|
|
|
}
|
2017-08-25 15:53:16 +03:00
|
|
|
$fileId = $cacheData['fileid'];
|
|
|
|
$data['fileid'] = $fileId;
|
|
|
|
// only reuse data if the file hasn't explicitly changed
|
|
|
|
if (isset($data['storage_mtime']) && isset($cacheData['storage_mtime']) && $data['storage_mtime'] === $cacheData['storage_mtime']) {
|
|
|
|
$data['mtime'] = $cacheData['mtime'];
|
|
|
|
if (($reuseExisting & self::REUSE_SIZE) && ($data['size'] === -1)) {
|
|
|
|
$data['size'] = $cacheData['size'];
|
|
|
|
}
|
|
|
|
if ($reuseExisting & self::REUSE_ETAG) {
|
|
|
|
$data['etag'] = $etag;
|
|
|
|
}
|
2013-10-24 16:24:56 +04:00
|
|
|
}
|
2017-08-25 15:53:16 +03:00
|
|
|
// Only update metadata that has changed
|
|
|
|
$newData = array_diff_assoc($data, $cacheData->getData());
|
|
|
|
} else {
|
|
|
|
$newData = $data;
|
|
|
|
$fileId = -1;
|
|
|
|
}
|
|
|
|
if (!empty($newData)) {
|
|
|
|
// Reset the checksum if the data has changed
|
|
|
|
$newData['checksum'] = '';
|
2020-02-15 00:08:13 +03:00
|
|
|
$newData['parent'] = $parentId;
|
2017-08-25 15:53:16 +03:00
|
|
|
$data['fileid'] = $this->addToCache($file, $newData, $fileId);
|
|
|
|
}
|
2020-02-15 00:09:11 +03:00
|
|
|
if ($cacheData && isset($cacheData['size'])) {
|
2017-08-25 15:53:16 +03:00
|
|
|
$data['oldSize'] = $cacheData['size'];
|
|
|
|
} else {
|
|
|
|
$data['oldSize'] = 0;
|
2013-03-22 16:52:07 +04:00
|
|
|
}
|
2016-01-13 23:40:48 +03:00
|
|
|
|
2020-02-15 00:09:11 +03:00
|
|
|
if ($cacheData && isset($cacheData['encrypted'])) {
|
2017-08-25 15:53:16 +03:00
|
|
|
$data['encrypted'] = $cacheData['encrypted'];
|
|
|
|
}
|
2016-04-20 16:22:22 +03:00
|
|
|
|
2017-08-25 15:53:16 +03:00
|
|
|
// post-emit only if it was a file. By that we avoid counting/treating folders as files
|
|
|
|
if ($data['mimetype'] !== 'httpd/unix-directory') {
|
2020-03-26 11:30:18 +03:00
|
|
|
$this->emit('\OC\Files\Cache\Scanner', 'postScanFile', [$file, $this->storageId]);
|
|
|
|
\OC_Hook::emit('\OC\Files\Cache\Scanner', 'post_scan_file', ['path' => $file, 'storage' => $this->storageId]);
|
2017-08-25 15:53:16 +03:00
|
|
|
}
|
|
|
|
} else {
|
|
|
|
$this->removeFromCache($file);
|
|
|
|
}
|
|
|
|
} catch (\Exception $e) {
|
|
|
|
if ($lock) {
|
|
|
|
if ($this->storage->instanceOfStorage('\OCP\Files\Storage\ILockingStorage')) {
|
|
|
|
$this->storage->releaseLock($file, ILockingProvider::LOCK_SHARED, $this->lockingProvider);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
throw $e;
|
2013-03-26 19:03:40 +04:00
|
|
|
}
|
2016-01-13 23:40:48 +03:00
|
|
|
|
|
|
|
//release the acquired lock
|
2015-06-18 14:47:03 +03:00
|
|
|
if ($lock) {
|
2016-01-04 16:11:21 +03:00
|
|
|
if ($this->storage->instanceOfStorage('\OCP\Files\Storage\ILockingStorage')) {
|
|
|
|
$this->storage->releaseLock($file, ILockingProvider::LOCK_SHARED, $this->lockingProvider);
|
|
|
|
}
|
2015-06-18 14:47:03 +03:00
|
|
|
}
|
2016-01-13 23:40:48 +03:00
|
|
|
|
2016-04-20 16:22:22 +03:00
|
|
|
if ($data && !isset($data['encrypted'])) {
|
|
|
|
$data['encrypted'] = false;
|
|
|
|
}
|
2013-03-22 16:52:07 +04:00
|
|
|
return $data;
|
2012-10-03 13:24:49 +04:00
|
|
|
}
|
2016-01-13 23:40:48 +03:00
|
|
|
|
2013-03-22 16:52:07 +04:00
|
|
|
return null;
|
2012-09-16 18:52:32 +04:00
|
|
|
}
|
|
|
|
|
2014-06-02 16:52:21 +04:00
|
|
|
protected function removeFromCache($path) {
|
2020-03-26 11:30:18 +03:00
|
|
|
\OC_Hook::emit('Scanner', 'removeFromCache', ['file' => $path]);
|
|
|
|
$this->emit('\OC\Files\Cache\Scanner', 'removeFromCache', [$path]);
|
2014-06-02 16:52:21 +04:00
|
|
|
if ($this->cacheActive) {
|
|
|
|
$this->cache->remove($path);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* @param string $path
|
|
|
|
* @param array $data
|
2014-09-10 17:57:59 +04:00
|
|
|
* @param int $fileId
|
2014-06-02 16:52:21 +04:00
|
|
|
* @return int the id of the added file
|
|
|
|
*/
|
2014-09-10 17:57:59 +04:00
|
|
|
protected function addToCache($path, $data, $fileId = -1) {
|
2017-05-18 17:38:54 +03:00
|
|
|
if (isset($data['scan_permissions'])) {
|
|
|
|
$data['permissions'] = $data['scan_permissions'];
|
|
|
|
}
|
2020-03-26 11:30:18 +03:00
|
|
|
\OC_Hook::emit('Scanner', 'addToCache', ['file' => $path, 'data' => $data]);
|
|
|
|
$this->emit('\OC\Files\Cache\Scanner', 'addToCache', [$path, $this->storageId, $data]);
|
2014-06-02 16:52:21 +04:00
|
|
|
if ($this->cacheActive) {
|
2014-09-10 17:57:59 +04:00
|
|
|
if ($fileId !== -1) {
|
|
|
|
$this->cache->update($fileId, $data);
|
|
|
|
return $fileId;
|
|
|
|
} else {
|
2020-02-15 00:10:09 +03:00
|
|
|
return $this->cache->insert($path, $data);
|
2014-09-10 17:57:59 +04:00
|
|
|
}
|
2014-06-02 16:52:21 +04:00
|
|
|
} else {
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* @param string $path
|
|
|
|
* @param array $data
|
2014-09-10 17:57:59 +04:00
|
|
|
* @param int $fileId
|
2014-06-02 16:52:21 +04:00
|
|
|
*/
|
2014-09-10 17:57:59 +04:00
|
|
|
protected function updateCache($path, $data, $fileId = -1) {
|
2020-03-26 11:30:18 +03:00
|
|
|
\OC_Hook::emit('Scanner', 'addToCache', ['file' => $path, 'data' => $data]);
|
|
|
|
$this->emit('\OC\Files\Cache\Scanner', 'updateCache', [$path, $this->storageId, $data]);
|
2014-06-02 16:52:21 +04:00
|
|
|
if ($this->cacheActive) {
|
2014-09-10 17:57:59 +04:00
|
|
|
if ($fileId !== -1) {
|
|
|
|
$this->cache->update($fileId, $data);
|
|
|
|
} else {
|
|
|
|
$this->cache->put($path, $data);
|
|
|
|
}
|
2014-06-02 16:52:21 +04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-09-16 18:52:32 +04:00
|
|
|
/**
|
2013-06-14 17:30:41 +04:00
|
|
|
* scan a folder and all it's children
|
2012-09-16 18:52:32 +04:00
|
|
|
*
|
2012-10-03 13:24:49 +04:00
|
|
|
* @param string $path
|
2013-03-24 05:06:50 +04:00
|
|
|
* @param bool $recursive
|
2013-06-14 18:53:08 +04:00
|
|
|
* @param int $reuse
|
2015-06-18 15:30:25 +03:00
|
|
|
* @param bool $lock set to false to disable getting an additional read lock during scanning
|
2014-05-11 21:13:51 +04:00
|
|
|
* @return array an array of the meta data of the scanned file or folder
|
2012-09-16 18:52:32 +04:00
|
|
|
*/
|
2015-06-18 14:47:03 +03:00
|
|
|
public function scan($path, $recursive = self::SCAN_RECURSIVE, $reuse = -1, $lock = true) {
|
2013-06-14 18:53:08 +04:00
|
|
|
if ($reuse === -1) {
|
2014-11-06 20:34:10 +03:00
|
|
|
$reuse = ($recursive === self::SCAN_SHALLOW) ? self::REUSE_ETAG | self::REUSE_SIZE : self::REUSE_ETAG;
|
2013-06-14 18:53:08 +04:00
|
|
|
}
|
2015-06-18 14:47:03 +03:00
|
|
|
if ($lock) {
|
2016-01-04 16:11:21 +03:00
|
|
|
if ($this->storage->instanceOfStorage('\OCP\Files\Storage\ILockingStorage')) {
|
2016-04-22 17:07:08 +03:00
|
|
|
$this->storage->acquireLock('scanner::' . $path, ILockingProvider::LOCK_EXCLUSIVE, $this->lockingProvider);
|
2016-01-04 16:11:21 +03:00
|
|
|
$this->storage->acquireLock($path, ILockingProvider::LOCK_SHARED, $this->lockingProvider);
|
|
|
|
}
|
2015-06-18 14:47:03 +03:00
|
|
|
}
|
2018-05-04 19:05:46 +03:00
|
|
|
try {
|
|
|
|
$data = $this->scanFile($path, $reuse, -1, null, $lock);
|
|
|
|
if ($data and $data['mimetype'] === 'httpd/unix-directory') {
|
|
|
|
$size = $this->scanChildren($path, $recursive, $reuse, $data['fileid'], $lock);
|
|
|
|
$data['size'] = $size;
|
|
|
|
}
|
|
|
|
} finally {
|
|
|
|
if ($lock) {
|
|
|
|
if ($this->storage->instanceOfStorage('\OCP\Files\Storage\ILockingStorage')) {
|
|
|
|
$this->storage->releaseLock($path, ILockingProvider::LOCK_SHARED, $this->lockingProvider);
|
|
|
|
$this->storage->releaseLock('scanner::' . $path, ILockingProvider::LOCK_EXCLUSIVE, $this->lockingProvider);
|
|
|
|
}
|
2016-01-04 16:11:21 +03:00
|
|
|
}
|
2015-06-18 14:47:03 +03:00
|
|
|
}
|
2014-02-28 17:23:07 +04:00
|
|
|
return $data;
|
2013-06-14 17:30:41 +04:00
|
|
|
}
|
2012-10-03 13:40:09 +04:00
|
|
|
|
2014-09-10 17:57:59 +04:00
|
|
|
/**
|
|
|
|
* Get the children currently in the cache
|
|
|
|
*
|
|
|
|
* @param int $folderId
|
|
|
|
* @return array[]
|
|
|
|
*/
|
|
|
|
protected function getExistingChildren($folderId) {
|
2020-03-26 11:30:18 +03:00
|
|
|
$existingChildren = [];
|
2014-09-10 17:57:59 +04:00
|
|
|
$children = $this->cache->getFolderContentsById($folderId);
|
|
|
|
foreach ($children as $child) {
|
|
|
|
$existingChildren[$child['name']] = $child;
|
2014-09-24 17:44:56 +04:00
|
|
|
}
|
|
|
|
return $existingChildren;
|
|
|
|
}
|
|
|
|
|
2013-06-14 17:30:41 +04:00
|
|
|
/**
|
|
|
|
* scan all the files and folders in a folder
|
|
|
|
*
|
|
|
|
* @param string $path
|
|
|
|
* @param bool $recursive
|
2013-06-14 18:53:08 +04:00
|
|
|
* @param int $reuse
|
2016-04-29 16:16:03 +03:00
|
|
|
* @param int $folderId id for the folder to be scanned
|
2015-06-18 15:30:25 +03:00
|
|
|
* @param bool $lock set to false to disable getting an additional read lock during scanning
|
2013-06-14 17:30:41 +04:00
|
|
|
* @return int the size of the scanned folder or -1 if the size is unknown at this stage
|
|
|
|
*/
|
2016-04-29 16:16:03 +03:00
|
|
|
protected function scanChildren($path, $recursive = self::SCAN_RECURSIVE, $reuse = -1, $folderId = null, $lock = true) {
|
2013-06-14 18:53:08 +04:00
|
|
|
if ($reuse === -1) {
|
2014-11-06 20:34:10 +03:00
|
|
|
$reuse = ($recursive === self::SCAN_SHALLOW) ? self::REUSE_ETAG | self::REUSE_SIZE : self::REUSE_ETAG;
|
2013-06-14 18:53:08 +04:00
|
|
|
}
|
2020-03-26 11:30:18 +03:00
|
|
|
$this->emit('\OC\Files\Cache\Scanner', 'scanFolder', [$path, $this->storageId]);
|
2012-09-16 18:52:32 +04:00
|
|
|
$size = 0;
|
2016-04-29 16:16:03 +03:00
|
|
|
if (!is_null($folderId)) {
|
2014-09-10 17:57:59 +04:00
|
|
|
$folderId = $this->cache->getId($path);
|
|
|
|
}
|
2016-04-29 16:16:03 +03:00
|
|
|
$childQueue = $this->handleChildren($path, $recursive, $reuse, $folderId, $lock, $size);
|
|
|
|
|
|
|
|
foreach ($childQueue as $child => $childId) {
|
2016-05-18 16:06:15 +03:00
|
|
|
$childSize = $this->scanChildren($child, $recursive, $reuse, $childId, $lock);
|
2016-04-29 16:16:03 +03:00
|
|
|
if ($childSize === -1) {
|
|
|
|
$size = -1;
|
2020-04-10 11:35:09 +03:00
|
|
|
} elseif ($size !== -1) {
|
2016-04-29 16:16:03 +03:00
|
|
|
$size += $childSize;
|
|
|
|
}
|
|
|
|
}
|
2016-05-23 14:53:05 +03:00
|
|
|
if ($this->cacheActive) {
|
2020-03-26 11:30:18 +03:00
|
|
|
$this->cache->update($folderId, ['size' => $size]);
|
2016-05-23 14:53:05 +03:00
|
|
|
}
|
2020-03-26 11:30:18 +03:00
|
|
|
$this->emit('\OC\Files\Cache\Scanner', 'postScanFolder', [$path, $this->storageId]);
|
2016-04-29 16:16:03 +03:00
|
|
|
return $size;
|
|
|
|
}
|
|
|
|
|
|
|
|
private function handleChildren($path, $recursive, $reuse, $folderId, $lock, &$size) {
|
|
|
|
// we put this in it's own function so it cleans up the memory before we start recursing
|
2014-09-10 17:57:59 +04:00
|
|
|
$existingChildren = $this->getExistingChildren($folderId);
|
2020-03-27 19:47:20 +03:00
|
|
|
$newChildren = iterator_to_array($this->storage->getDirectoryContent($path));
|
2014-09-10 17:57:59 +04:00
|
|
|
|
|
|
|
if ($this->useTransactions) {
|
2016-01-07 12:18:38 +03:00
|
|
|
\OC::$server->getDatabaseConnection()->beginTransaction();
|
2014-09-10 17:57:59 +04:00
|
|
|
}
|
2016-04-29 16:16:03 +03:00
|
|
|
|
2014-09-10 17:57:59 +04:00
|
|
|
$exceptionOccurred = false;
|
2016-04-29 16:16:03 +03:00
|
|
|
$childQueue = [];
|
2020-03-27 19:47:20 +03:00
|
|
|
$newChildNames = [];
|
|
|
|
foreach ($newChildren as $fileMeta) {
|
2021-01-06 19:25:31 +03:00
|
|
|
$permissions = isset($fileMeta['scan_permissions']) ? $fileMeta['scan_permissions'] : $fileMeta['permissions'];
|
|
|
|
if ($permissions === 0) {
|
|
|
|
continue;
|
|
|
|
}
|
2020-03-27 19:47:20 +03:00
|
|
|
$file = $fileMeta['name'];
|
|
|
|
$newChildNames[] = $file;
|
2018-01-27 01:46:40 +03:00
|
|
|
$child = $path ? $path . '/' . $file : $file;
|
2014-09-10 17:57:59 +04:00
|
|
|
try {
|
2020-02-15 00:09:11 +03:00
|
|
|
$existingData = isset($existingChildren[$file]) ? $existingChildren[$file] : false;
|
2020-03-27 19:47:20 +03:00
|
|
|
$data = $this->scanFile($child, $reuse, $folderId, $existingData, $lock, $fileMeta);
|
2014-09-10 17:57:59 +04:00
|
|
|
if ($data) {
|
|
|
|
if ($data['mimetype'] === 'httpd/unix-directory' and $recursive === self::SCAN_RECURSIVE) {
|
2016-04-29 16:16:03 +03:00
|
|
|
$childQueue[$child] = $data['fileid'];
|
2020-04-10 11:35:09 +03:00
|
|
|
} elseif ($data['mimetype'] === 'httpd/unix-directory' and $recursive === self::SCAN_RECURSIVE_INCOMPLETE and $data['size'] === -1) {
|
2016-05-18 16:06:15 +03:00
|
|
|
// only recurse into folders which aren't fully scanned
|
|
|
|
$childQueue[$child] = $data['fileid'];
|
2020-04-10 11:35:09 +03:00
|
|
|
} elseif ($data['size'] === -1) {
|
2014-09-10 17:57:59 +04:00
|
|
|
$size = -1;
|
2020-04-10 11:35:09 +03:00
|
|
|
} elseif ($size !== -1) {
|
2014-09-10 17:57:59 +04:00
|
|
|
$size += $data['size'];
|
2012-09-16 18:52:32 +04:00
|
|
|
}
|
|
|
|
}
|
2021-01-03 17:28:31 +03:00
|
|
|
} catch (Exception $ex) {
|
2014-09-10 17:57:59 +04:00
|
|
|
// might happen if inserting duplicate while a scanning
|
|
|
|
// process is running in parallel
|
|
|
|
// log and ignore
|
2017-08-25 15:53:16 +03:00
|
|
|
if ($this->useTransactions) {
|
|
|
|
\OC::$server->getDatabaseConnection()->rollback();
|
|
|
|
\OC::$server->getDatabaseConnection()->beginTransaction();
|
|
|
|
}
|
2018-01-17 17:21:56 +03:00
|
|
|
\OC::$server->getLogger()->logException($ex, [
|
|
|
|
'message' => 'Exception while scanning file "' . $child . '"',
|
2018-04-25 16:22:28 +03:00
|
|
|
'level' => ILogger::DEBUG,
|
2018-01-17 17:21:56 +03:00
|
|
|
'app' => 'core',
|
|
|
|
]);
|
2014-09-10 17:57:59 +04:00
|
|
|
$exceptionOccurred = true;
|
2015-06-24 16:42:00 +03:00
|
|
|
} catch (\OCP\Lock\LockedException $e) {
|
|
|
|
if ($this->useTransactions) {
|
2016-01-07 12:18:38 +03:00
|
|
|
\OC::$server->getDatabaseConnection()->rollback();
|
2015-06-24 16:42:00 +03:00
|
|
|
}
|
|
|
|
throw $e;
|
2012-09-16 18:52:32 +04:00
|
|
|
}
|
2014-09-10 17:57:59 +04:00
|
|
|
}
|
2020-03-27 19:47:20 +03:00
|
|
|
$removedChildren = \array_diff(array_keys($existingChildren), $newChildNames);
|
2014-09-10 17:57:59 +04:00
|
|
|
foreach ($removedChildren as $childName) {
|
2018-01-27 01:46:40 +03:00
|
|
|
$child = $path ? $path . '/' . $childName : $childName;
|
2014-09-10 17:57:59 +04:00
|
|
|
$this->removeFromCache($child);
|
|
|
|
}
|
|
|
|
if ($this->useTransactions) {
|
2016-01-07 12:18:38 +03:00
|
|
|
\OC::$server->getDatabaseConnection()->commit();
|
2014-09-10 17:57:59 +04:00
|
|
|
}
|
|
|
|
if ($exceptionOccurred) {
|
|
|
|
// It might happen that the parallel scan process has already
|
|
|
|
// inserted mimetypes but those weren't available yet inside the transaction
|
|
|
|
// To make sure to have the updated mime types in such cases,
|
|
|
|
// we reload them here
|
2015-09-11 14:44:53 +03:00
|
|
|
\OC::$server->getMimeTypeLoader()->reset();
|
2014-09-10 17:57:59 +04:00
|
|
|
}
|
2016-04-29 16:16:03 +03:00
|
|
|
return $childQueue;
|
2012-09-16 18:52:32 +04:00
|
|
|
}
|
2013-02-10 21:15:23 +04:00
|
|
|
|
2013-02-10 17:16:45 +04:00
|
|
|
/**
|
2014-05-19 19:50:53 +04:00
|
|
|
* check if the file should be ignored when scanning
|
2013-02-10 17:16:45 +04:00
|
|
|
* NOTE: files with a '.part' extension are ignored as well!
|
|
|
|
* prevents unfinished put requests to be scanned
|
2014-06-02 16:52:21 +04:00
|
|
|
*
|
2014-05-12 00:51:30 +04:00
|
|
|
* @param string $file
|
2013-02-10 17:16:45 +04:00
|
|
|
* @return boolean
|
|
|
|
*/
|
2013-05-10 14:00:13 +04:00
|
|
|
public static function isPartialFile($file) {
|
|
|
|
if (pathinfo($file, PATHINFO_EXTENSION) === 'part') {
|
2013-02-10 17:16:45 +04:00
|
|
|
return true;
|
|
|
|
}
|
2015-10-12 14:59:16 +03:00
|
|
|
if (strpos($file, '.part/') !== false) {
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2013-02-10 17:16:45 +04:00
|
|
|
return false;
|
|
|
|
}
|
2012-11-22 02:18:58 +04:00
|
|
|
|
|
|
|
/**
|
|
|
|
* walk over any folders that are not fully scanned yet and scan them
|
|
|
|
*/
|
|
|
|
public function backgroundScan() {
|
2016-03-24 17:17:13 +03:00
|
|
|
if (!$this->cache->inCache('')) {
|
|
|
|
$this->runBackgroundScanJob(function () {
|
|
|
|
$this->scan('', self::SCAN_RECURSIVE, self::REUSE_ETAG);
|
|
|
|
}, '');
|
|
|
|
} else {
|
|
|
|
$lastPath = null;
|
|
|
|
while (($path = $this->cache->getIncomplete()) !== false && $path !== $lastPath) {
|
2017-02-10 17:29:48 +03:00
|
|
|
$this->runBackgroundScanJob(function () use ($path) {
|
2016-05-18 16:06:15 +03:00
|
|
|
$this->scan($path, self::SCAN_RECURSIVE_INCOMPLETE, self::REUSE_ETAG | self::REUSE_SIZE);
|
2016-03-24 17:17:13 +03:00
|
|
|
}, $path);
|
|
|
|
// FIXME: this won't proceed with the next item, needs revamping of getIncomplete()
|
|
|
|
// to make this possible
|
|
|
|
$lastPath = $path;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
private function runBackgroundScanJob(callable $callback, $path) {
|
|
|
|
try {
|
|
|
|
$callback();
|
2020-03-26 11:30:18 +03:00
|
|
|
\OC_Hook::emit('Scanner', 'correctFolderSize', ['path' => $path]);
|
2016-04-15 18:33:02 +03:00
|
|
|
if ($this->cacheActive && $this->cache instanceof Cache) {
|
2019-03-02 01:52:58 +03:00
|
|
|
$this->cache->correctFolderSize($path, null, true);
|
2014-05-28 21:20:20 +04:00
|
|
|
}
|
2016-03-24 17:17:13 +03:00
|
|
|
} catch (\OCP\Files\StorageInvalidException $e) {
|
|
|
|
// skip unavailable storages
|
|
|
|
} catch (\OCP\Files\StorageNotAvailableException $e) {
|
|
|
|
// skip unavailable storages
|
|
|
|
} catch (\OCP\Files\ForbiddenException $e) {
|
|
|
|
// skip forbidden storages
|
|
|
|
} catch (\OCP\Lock\LockedException $e) {
|
|
|
|
// skip unavailable storages
|
2012-11-22 02:18:58 +04:00
|
|
|
}
|
|
|
|
}
|
2014-05-30 17:42:41 +04:00
|
|
|
|
|
|
|
/**
|
|
|
|
* Set whether the cache is affected by scan operations
|
2014-06-02 16:52:21 +04:00
|
|
|
*
|
2014-05-30 17:42:41 +04:00
|
|
|
* @param boolean $active The active state of the cache
|
|
|
|
*/
|
|
|
|
public function setCacheActive($active) {
|
|
|
|
$this->cacheActive = $active;
|
|
|
|
}
|
2012-09-16 18:52:32 +04:00
|
|
|
}
|